Network Time Protocol ([x]ntpd) daemon contains buffer overflow in ntp_control:ctl_getitem() function

2001-04-05T00:00:00
ID VU:970472
Type cert
Reporter CERT
Modified 2008-05-22T00:00:00

Description

Overview

There is a buffer overflow defect in the ctl_getitem() function of the Network Time Protocol (NTP) daemon responsible for providing accurate time reports used for synchronizing the clocks on installed systems. All NTP daemons based on code maintained at the University of Delaware since NTPv2 are assumed at risk.

Description

The buffer overflow condition appears in the ctl_getitem() function in ntp_control.c, the NTP control code. Because the ntp protocol uses UDP, attacks attempting to exploit this vulnerability will likely be spoofed.


Impact

It has been reported that a remote intruder can execute arbitrary code with the default privileges on the running daemon, typically root. While this report is still being evaluated, crashing of the NTP daemon has been confirmed.


Solution

Apply patches supplied by your vendor


Until patches can be applied, the CERT/CC strongly urges affected sites to block ntp requests (123/{tcp,udp}) at their network perimeter or disable ntpd altogether. It is unclear at this time if using secured NTP services provides a full defense against all attacks attempting to exploit this vulnerability.


Systems Affected

Vendor| Status| Date Notified| Date Updated
---|---|---|---
Berkeley Software Design, Inc.| | -| 10 Apr 2001
Compaq Computer Corporation| | 05 Apr 2001| 03 May 2001
Debian Linux| | -| 10 Apr 2001
FreeBSD, Inc.| | 05 Apr 2001| 13 Apr 2001
Hewlett-Packard Company| | -| 09 Apr 2001
IBM Corporation| | 05 Apr 2001| 21 May 2008
Mandriva, Inc.| | -| 06 Apr 2001
NetBSD| | 05 Apr 2001| 05 Apr 2001
OpenBSD| | 05 Apr 2001| 06 Apr 2001
Red Hat, Inc.| | 05 Apr 2001| 09 Apr 2001
Slackware| | -| 09 Apr 2001
Sun Microsystems, Inc.| | 05 Apr 2001| 31 Oct 2001
SUSE Linux| | -| 16 Apr 2001
The SCO Group (SCO Linux)| | 05 Apr 2001| 09 Apr 2001
The SCO Group (SCO Unix)| | -| 16 Apr 2001
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
---|---|---
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A

References

Credit

The CERT/CC thanks Przemyslaw Frasunek for reporting this issue.

This document was written by Jeffrey S. Havrilla

Other Information

  • CVE IDs: CVE-2001-0414
  • Date Public: 04 Apr 2001
  • Date First Published: 05 Apr 2001
  • Date Last Updated: 22 May 2008
  • Severity Metric: 79.65
  • Document Revision: 35